Completed
DYNAMIC ANALYSIS: OPENERS
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Estimating Development Security Maturity in About an Hour
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 NOT FOR NOOBS
- 3 THREE EXAMPLE STORIES
- 4 METHOD OVERVIEW
- 5 PRE-MEETING RESEARCH
- 6 MEET WITH THE DEVELOPMENT TEAM
- 7 DEVELOPMENT MEETING SAMPLE AGENDA
- 8 DEVELOPMENT MEETING WARNING SIGNS
- 9 FIVE KEY BEHAVIORS
- 10 WHAT TO LOOK FOR IN EACH
- 11 TRAINING: OPENERS
- 12 TRAINING: POSITIVES AND NEGATIVES
- 13 TRAINING: WARNING SIGNS AND EXITS
- 14 THREAT MODELING: OPENERS
- 15 THREAT MODELING: POSITIVES AND NEGATIVES
- 16 THREAT MODELING: WARNING SIGNS AND EXITS
- 17 STATIC ANALYSIS: OPENERS
- 18 STATIC: POSITIVES & NEGATIVES
- 19 STATIC: WARNING SIGNS AND EXITS
- 20 DYNAMIC ANALYSIS: OPENERS
- 21 DYNAMIC: POSITIVES AND NEGATIVES
- 22 DYNAMIC: WARNING SIGNS AND EXITS
- 23 V&IR: POSITIVES AND NEGATIVES
- 24 SCORING METHOD
- 25 REPORT BACK
- 26 TIPS & TRICKS
- 27 IS AND ISN'T
- 28 BUILDING SECURITY IN MATURITY MODEL
- 29 OPEN SOFTWARE ASSURANCE MATURITY MODEL
- 30 FOR JUST A FEW HOURS MORE
- 31 SUMMARY
- 32 APPLY WHAT YOU HAVE LEARNED TODAY